Emne | Cybertrusler & Angreb

De digitale trusler udvikler sig hastigt, og cyberangreb bliver både mere målrettede og sofistikerede.

Temaet stiller skarpt på de aktuelle trusselsbilleder fra ransomware og phishing til statssponsorerede angreb og præsenterer de nyeste metoder til detektion, forebyggelse og respons.

Fokus er både på teknologi og menneskelig faktor.

onsdag den 6. maj 2026
Securing your AI transformation09.30 - 10.00Sal 1
Exposure Management in a Changing World - Navigating Uncertainty and Volatility09.45 - 10.15Theater 10
Leman’s Security Transformation: A Customer Journey with Arctic Wolf09.45 - 10.15Sal 7
Assume breach, prepare for recovery: why data resilience is mandatory for business survival09.45 - 10.15Sal 3
Operating through crisis: The new reality of European security09.45 - 10.15Sal 2
The new frontier of cyber threats09.45 - 10.15Cyber Innovation Stage
Building Cyber Resilience in the Age of AI09.45 - 10.15Sal 6
Your Threat Intelligence Has a Blind Spot the Size of the Open Internet10.00 - 10.45Main Stage
Join this exclusive expert session where we cut through the buzzwords and share practical ways to secure AI in the enterprise10.15 - 10.45Sal 8
How to deal with Agentic AI in a Zero Trust ecosystem10.15 - 10.45Sal 4
From Threat Intel to Detection Rules: Can LLMs Do the Heavy Lifting?10.30 - 11.00Theater 10
Unlock AI Without the Risk: How to See, Govern, and Secure Every AI Tool in Your Network10.30 - 11.00Sal 6
Det aktuelle trusselsbillede for danske virksomheder i 202610.30 - 11.00Sal 3
Se fremad – før truslen rammer: Fra indsigt til handling i dansk cybersikkerhed10.30 - 11.00Sal 2
Guided Tour | People and Identity - The Most Critical Factor in Cybersecurity10.30 - 11.00Guidede ture mødested
The Invisible Insider: When AI Has Autonomy11.00 - 11.30Sal 5
30 år med Offensive Security – en dinosaurs bekendelser11.00 - 11.30Sal 1
From signals to stories: Don't just go with the (net)flow11.00 - 11.30Sal 8
AI – den nye angrebsflade11.00 - 11.30Sal 4
Cyber Resilience at Speed and Scale with FIDO Pre-Reg11.15 - 11.45Sal 6
Secure by Design – Fremtiden for endpoint beskyttelse11.15 - 11.45Sal 2
The Proactive Pivot: How Operational Threat Intelligence and Exposure Management Defeat AI Scaled Attacks11.15 - 11.45Theater 10
Den moderne arbejdsplads uden grænser: Centraliseret kontrol og Zero Trust med Chrome Enterprise11.15 - 11.45Sal 3
Guided Tour | When the Attack Happens - Detecting and Responding to Modern Cyber Threats11.30 - 12.30Guidede ture mødested
Stop Guessing, Start Knowing: Turning Intelligence into Remediation11.45 - 12.15Sal 1
From Vulnerability Lists to Measurable Outcomes: Unifying IT Operations and Security11.45 - 12.15Theater 9
The "Vibe Coding" Trap: Securing Agentic AI11.45 - 12.15Sal 8
Gør backup til en aktiv del af din sikkerhedsstrategi11.45 - 12.15Sal 5
Kan man stole på et IP kamera fra Kina12.00 - 12.30Sal 2
Mennesket som angrebsflade – fra phishing til CEO-fraud og deepfakes12.00 - 12.30Sal 6
Cisco Cybersecurity Customer Case: Samsøe Samsøe12.30 - 13.00Sal 1
When reality lies: Deepfakes and the Evolution of Phishing APT12.30 - 13.00Theater 9
Keepit: When the Cloud Goes Dark — Resilience Lessons from Hybrid Threats12.30 - 13.00Sal 8
Guided Tour | Securing Cloud and Hybrid IT - Control Without Slowing the Business12.30 - 13.00Guidede ture mødested
Reaction to Readiness: Practical Resilience Strategies in an era of Geopolitical Uncertainty12.30 - 13.00Sal 5
It trusselsbilledet anno 202612.45 - 13.15Sal 6
Katten efter musen12.45 - 13.15Theater 10
API security threats in the real world12.45 - 13.15Sal 2
Europe First: Fremtidssikret informationssikkerhed i en ustabil verden12.45 - 13.15Sal 3
Fra IT-drift til national sikkerhed: En CIO’s forsvar mod moderne hybridtrusler13.00 - 13.45Main Stage
Beyond the Perimeter: The New Identity Mandate13.15 - 13.45Sal 1
Fra Trusler til Træthed, fra Fatigue til Fokus13.15 - 13.45Sal 4
CEO vs Hacker - Lektioner fra Dark Web13.15 - 13.45Theater 9
Stop med kun at tale om sikkerhed – her er de konkrete greb, der skaber handling13.15 - 13.45Sal 8
Securing Every Identity: Humans, Machines, and AI13.15 - 13.45Sal 5
Cyberslaverne: Bag kulissen på internettets mørkeste svindelsyndikater13.15 - 13.50V2 Stage
Why Business Resilience Requires an End‑to‑End Mindset13.30 - 14.00Sal 6
Hybrid Mesh Firewalls – Gartner Buzzword eller nødvendig ændring i arkitekturen?13.30 - 14.00Theater 10
The first move matters: Successful Incident handling to avoid a crisis13.30 - 14.00Sal 7
En scanner viser potentielle huller. En angriber finder veje. Vi viser dig forskellen.13.30 - 14.00Sal 3
Closing the Identity Blind Spots Across Humans, Machines, and AI13.30 - 14.00Sal 2
Guided Tour | Secure Operations, OT and Infrastructure - Cybersecurity in Everyday Practice13.30 - 14.00Guidede ture mødested
2026 State of Security14.00 - 14.30Sal 4
Beyond the Chatbot: Engineering Agentic Workflows for the Modern SOC14.00 - 14.30Sal 1
Breaking Down Europe’s Threat Landscape14.00 - 14.30Theater 9
Styrk jeres cyber-resiliens med moderne databeskyttelse14.00 - 14.30Sal 5
AI workload fundamentals & the new traffic pattern14.00 - 14.30Sal 8
Bestseller: Forberedelser på hybridkrig14.00 - 14.45Main Stage
From Exposure to Exploitation: A Data-Driven Look at Danish Cyber Threats14.15 - 14.45Sal 6
Vi er i en tid, hvor identiteter og sandheden kan forfalskes på sekunder.14.15 - 14.45Theater 10
Data Security & AI Data Governance — Creating an Experience Worth Trusting14.15 - 14.45Sal 3
Real-world Attack & Defence Incidents – A Cyber Resilience Walkthrough14.15 - 14.45Sal 2
Guided Tour | Compliance, NIS2 and Risk Management - Turning Requirements into Business Value14.30 - 15.00Guidede ture mødested
Securing the New AI Frontier: Why You Can’t Secure AI with More AI14.45 - 15.00Cyber Innovation Lab
The 3 AM Problem – Why Your Security Fails When It Matters Most14.45 - 15.15Sal 1
Preemptive Security as a foundational cyber defense control14.45 - 15.15Sal 4
Ransomware resilience14.45 - 15.15Sal 5
Connect, Protect & Build with Cloudflare14.45 - 15.15Sal 8
Network Segmentation Pitfalls and Hybrid Attack Paths14.45 - 15.15Theater 9
Da hackerne begik en teknisk brøler: Sådan gik Travelmarket til modangreb14.45 - 15.20V2 Stage
Algoritmen kan forudsige en graviditet. Kan den også afsløre en falsk CFO?15.00 - 15.30Sal 7
Trusselsbilledet 2026: Fra helikopterperspektiv til hverdagens beslutninger15.00 - 15.30Sal 6
Cyber Resilience Act: Er I klar til de nye spilleregler?15.00 - 15.30Sal 2
The New Perimeter: Securing Against the New Era of Autonomous Threats15.30 - 16.00Sal 8
Beyond the Blind Spot: Seeing Every Device Before It Becomes a Liability15.30 - 16.00Sal 4
The Outside-In Advantage: Modernising TPRM with AI and Threat Intelligence15.30 - 16.00Sal 5
Fra lovtekst til virkelighed: Hvordan sikrer vi danske produkter i en CRA-tid?15.30 - 16.15Sal 2
Reporting Active Exploits in 24 Hours: Are You Ready for the CRA?15.45 - 16.15Sal 3
NATO’s Strategy for a New Era of Hybrid Warfare16.00 - 16.45Main Stage
torsdag den 7. maj 2026
Compliance is broken. Governance needs to evolve.09.45 - 10.15Sal 7
AI or Die: Achieving the Autonomous SOC09.45 - 10.15Sal 6
The Cyber Arena: A CTF for Curious Minds and Seasoned Hackers09.45 - 11.45Sal 2
Guided Tour | Secure Operations, OT and Infrastructure - Cybersecurity in Everyday Practice10.00 - 10.30Guidede ture mødested
Hvordan vi gør cybersikkerhed konkret, forståelig og handlingsbar for SMV’er.10.15 - 10.30Cyber Innovation Lab
Unlock AI Without the Risk: How to See, Govern, and Secure Every AI Tool in Your Network10.15 - 10.45Sal 5
Live demo: angreb vs. forsvar - følg angrebet live og se Splunk skabe fuld visibilitet10.15 - 10.45Theater 9
How to deal with Agentic AI in a Zero Trust ecosystem10.15 - 10.45Sal 4
Det aktuelle trusselsbillede for danske virksomheder i 202610.30 - 11.00Theater 10
Think like an adversary. Beyond CTEM "Your security metrics.. might be lying to you"11.00 - 11.30Sal 4
Leveling the Playing Field: Using Agentic AI and Network Evidence to Win the Cyber Arms Race11.00 - 11.30Sal 8
Guided Tour | Compliance, NIS2 and Risk Management - Turning Requirements into Business Value11.00 - 11.30Guidede ture mødested
Usynlig fjende: Da cyberkrigen ramte Danmark11.00 - 11.35V2 Stage
The Cyber Laboratory: Ukraine’s Frontline Lessons on Resilience11.00 - 11.45Main Stage
Er jeres flåde klar til en Ransomware-fri fremtid? En praktisk guide til ChromeOS-migrering11.15 - 11.45Sal 3
Cloud Security in the AI Era: The Biggest Risks and How to Stop Them11.45 - 12.15Sal 8
Cloud Security & Visibility11.45 - 12.15Sal 5
Guided Tour | People and Identity - The Most Critical Factor in Cybersecurity12.00 - 12.30Guidede ture mødested
Cybersecurity in the Age of AI: Reducing Risk With Microsegmentation 12.00 - 12.30Sal 3
AI løber stærkt. Sørg for, at dine data ikke løber fra dig12.00 - 12.30Sal 7
Breaking the Reactive Cycle: A Masterclass in Modern Cyber Security for MSPs12.45 - 13.15Sal 6
Quantumtruslen forklaret12.45 - 13.15Sal 3
This Was Never a Drill: The Case for Autonomous IT12.45 - 13.15Sal 7
Workshop: Ledelse af cyberkriser12.45 - 14.15Sal 2
Guided Tour | When the Attack Happens - Detecting and Responding to Modern Cyber Threats13.00 - 13.30Guidede ture mødested
WatchGuard Open MDR: The future of MDR is Flexible, Integrated, and Open13.15 - 13.45Sal 4
Live Hacking: Bryd ind i maskinrummet og lær at lukke hullerne13.15 - 13.50V2 Stage
Guided Tour | Securing Cloud and Hybrid IT - Control Without Slowing the Business14.00 - 14.30Guidede ture mødested